Sciweavers

165 search results - page 28 / 33
» Statistical analysis of simulation output: state of the art
Sort
View
WSC
2004
14 years 11 months ago
Fast Model-Based Penetration Testing
Traditional approaches to security evaluation have been based on penetration testing of real systems, or analysis of formal models of such systems. The former suffer from the prob...
Sankalp Singh, James Lyons, David M. Nicol
CISS
2008
IEEE
15 years 4 months ago
Grassmannian beamforming for MIMO amplify-and-forward relaying
Abstract— In this paper, we consider the beamforming codebook design problem for the half-duplex MIMO amplify-andforward relay channel with Rayleigh fading. The analysis is divid...
Behrouz Khoshnevis, Wei Yu, Raviraj Adve
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
104
Voted
JSW
2007
102views more  JSW 2007»
14 years 9 months ago
Model-driven Engineering for Early QoS Validation of Component-based Software Systems
— Model-driven engineering (MDE) techniques are increasingly being used to address many of the development and operational lifecycle concerns of large-scale component-based syste...
James H. Hill, Aniruddha S. Gokhale
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 1 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter